A new administrative assistant starts with the company and tries to access the personnel file for the Vice
President of Operations, but is denied. Which of the following BEST describes this access control method?
A technician completes a WLAN audit and notices that a number of unknown devices are connected. Which of
the following can BEST be completed to mitigate the issue?